Ccna 2020 200-301
Ccna 2020 200-301
Ccna 2020 200-301
Contact Info:
Mail: support@spoto.net
platform. Use this Promotion code certcollection. You can get lowest price. Just for
certcollection members.
1. Which two capabilities of Cisco DNA Center make it more extensible? (Choose two.)
C. REST APIS that allow for external applications to interact natively with Cisco DNA
Center
Correct Answer: CE
Correct Answer: C
3. A router running EIGRP has learned the same route from two different paths. Which
A. administrative distance
B. cost
C. metric
D. as-path
Correct Answer: C
networks?
configurations
D. Only controller-based networks decouple the control plane and the data plane
Correct Answer: D
5. Which network allows devices to communicate without the need to access the
Internet?
A. 172.9.0.0/16
B. 172.28.0.0/16
C. 192.0.0.0/8
D. 209.165.201.0/24
Correct Answer: B
6.
Which IPv6 address type provides communication between subnets and cannot
A. multicast
B. unique local
C. link-local
D. global unicast
Correct Answer: B
A. enable secret
B. enable password
C. service password-encryption
Correct Answer: C
8. When a floating static route is configured, which action ensures that the backup
A. The administrative distance must be higher on the primary route so that the
B. The floating static route must have a higher administrative distance than the
C. The default information originate command must be configured for the route to
D. The floating static route must have a lower administrative distance than the
Correct Answer: B
9.
Which two tasks must be performed to configure NTP to a trusted server in client
Correct Answer: AB
10. A network engineer must back up 20 network router configurations globally within
A. SMTP
B. SNMP
C. ARP
D. CDP
Correct Answer: B
11. Router 1 has a Fast Ethernet interface 0/0 with IP address 10.1.1.1. The interface is
Which of the following commands could be part of a valid configuration for Router
B. dot1q enable
C. dot1q enable 4
D. trunking enable
E. trunking enable 4
F. encapsulation dot1q 4
G. Both A and F
H. Both C and F
Correct Answer: G
command when in interface configuration mode for G0/1.2. Which answers are
E. Both A and C
F. Both B and C
Correct Answer: E
13. A Layer 3 switch has been configured to route IP packets between VLANs 1, 2
command on the Layer 3 switch, listing the connected routes. Which of the
following answers lists a piece of information that should be in at least one of the
routes?
D. Mask 255.255.255.0
Correct Answer: C
14. An engineer has successfully configured a Layer 3 switch with SVIs for VLANs 2
and 3. Hosts in the subnets using VLANs 2 and 3 can ping each other with the Layer
3 switch routing the packets. The next week, the network engineer receives a call
that those same users can no longer ping each other. If the problem is with the
Layer 3 switching function, which of the following could have caused the problem?
A. Six -- or more -- out of 10 working VLAN 2 access ports failing due to physical
problems
C. VTP on the switch removing VLAN 3 from the switch's VLAN list
E. Both C and D
F. Both B and D
Correct Answer: E
15. A LAN design uses a Layer 3 EtherChannel between two switches, SW1 and SW2,
with port-channel interface 1 used on both switches. SW1 uses ports G0/1, G0/2
and G0/3 in the channel. Which of the following are true about SW1's configuration
to make the channel be able to route IPv4 packets correctly?
command.
E. Both B and D
F. Both A and C
Correct Answer: F
16. A LAN design uses a Layer 3 EtherChannel between two switches, SW1 and SW2,
with port-channel interface 1 used on both switches. SW1 uses ports G0/1 and
G0/2 in the channel. However, only interface G0/1 is bundled into the channel and
working. Think about the configuration settings on port G0/2 that could have
existed before adding G0/2 to the EtherChannel. Which answers identify a setting
that could prevent IOS from adding G0/2 to the Layer 3 EtherChannel?
E. Both A and C
F. Both B and C
Correct Answer: F
17. All 30 users on a single floor of a building are complaining about network slowness.
After investigating the access switch, the network administrator notices that the MAC
address table is full (10,000 entries) and all traffic is being flooded out of every port.
Which action can the administrator take to prevent this from occurring?
E. Configure a VACL to block all IP traffic except traffic to and from that subnet
Correct Answer: A
18. Which two keying mechanisms are available within MACsec? (Choose
two.)
A. IKE
B. GDOI
C. SAP
D. MKA
E. Diffie-Hellman
Correct Answer: CD
19. Which two features are supported on the Cisco Adaptive Security Virtual Appliance?
(Choose two.)
A. high availability
B. EtherChannel
C. site-to-site VPN
D. PAK-based licensing
E. multiple contexts
F. clustering
Correct Answer: AC
20. Which type of authentication and encryption does SNMPv3 use at the authPriv
security level?
Correct Answer: B
21. Which identity store option allows you to modify the directory services that run on
TCP/IP?
C. RADIUS
D. Active Directory
Correct Answer: A
22. Which statement about system time and NTP server configuration with Cisco ISE is
true?
A. The system time and NTP server settings can be configured centrally on the Cisco
ISE.
B. The system time can be configured centrally on the Cisco ISE, but NTP server settings
C. NTP server settings can be configured centrally on the Cisco ISE, but the system time
D. The system time and NTP server settings must be configured individually on each ISE
node.
Correct Answer: D
23. Which option is required for inline security group tag propagation?
B. hardware support
Correct Answer: B
24. Which protocol sends authentication and accounting in different
requests?
A. RADIUS
B. TACACS+
C. EAP-Chaining
D. PEAP
E. EAP-TLS
Correct Answer: B
25. Your company network security policy requires that all network traffic be tunneled
to the corporate office. End users must be able to access local LAN resources when they
A. split-exclude tunneling
C. static routes
E. tunnel all
Correct Answer: BE
26. What advantage does elliptic curve cryptography have over RSA cryptography?
Correct Answer: D
27. Which description of the Layer 4 traffic Monitor on a Cisco WSA is true?
C. prevents data exfiltration by searching all the network traffic for specified sensitive
information
D. blocks traffic from URL categories that are known to contain malicious content
Correct Answer: A